2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) 2013
DOI: 10.1109/wimob.2013.6673436
|View full text |Cite
|
Sign up to set email alerts
|

Trust-based Security Protocol against blackhole attacks in opportunistic networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 28 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…S. Gupta et al [56] proposed a trust-based security protocol scheme that aims to prevent blackhole attacks within Opportunistic Networks. The proposed scheme is a function of a social group value (SGV ) and a trust distribution technique.…”
Section: A Oppnets Intrusion Detection Schemesmentioning
confidence: 99%
“…S. Gupta et al [56] proposed a trust-based security protocol scheme that aims to prevent blackhole attacks within Opportunistic Networks. The proposed scheme is a function of a social group value (SGV ) and a trust distribution technique.…”
Section: A Oppnets Intrusion Detection Schemesmentioning
confidence: 99%
“…Several secured routing protocols for Oppnets have been proposed in the literature. Representative ones are listed in the reference list (see previous studies [11][12][13][14][15][16][17] ). The tabular representation of secure routing protocols of opportunistic networks are represented in Table 1.…”
Section: Secure Routing Protocols Of Opportunistic Networkmentioning
confidence: 99%
“…The research [14] encompassed mainly on black hole attack against PROFET routing protocol for opportunistic networks.…”
Section: Trust Based Security Protocol Against Black Hole Attacks Inmentioning
confidence: 99%